Secondary development implementation method of embedded security and protection monitoring equipment and storage medium
The invention discloses a secondary development implementation method for embedded security monitoring equipment and a storage medium, and the method comprises the following steps: enabling an embedded operating system to run on a hardware CPU of the equipment; enabling the original factory applicat...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The invention discloses a secondary development implementation method for embedded security monitoring equipment and a storage medium, and the method comprises the following steps: enabling an embedded operating system to run on a hardware CPU of the equipment; enabling the original factory application program to run in the embedded operating system environment; enabling a Java operation environment transplanted by an original factory to run in the embedded operation system environment; and enabling a program customized by a downstream client to run in the Java running environment. Compared with the prior art, the method has the advantages that the development human input cost of downstream customers is low; the consumption of a Java running environment on a CPU and a memory can be limited during transplantation, so that application programs developed by downstream clients are ensured not to influence the existing functions of the monitoring equipment; the originally developed program can run in new equipment |
---|